text stringlengths 30 4k | source stringlengths 60 201 |
|---|---|
processes 1, 2, 3, solves
BA with 1 possible failure.
• Construct new system S from 2 copies
of A, with initial values as follows:
• What is S?
– A synchronous system of some kind.
– Not required to satisfy any particular
correctness conditions.
3′
1
1
A
3
2
1
2
0
1
S
0
1
0
3
– Not necessarily a correct BA algorithm... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
1-2 from S.
In A, 3 and 1 must agree.
•
• So by indistinguishability, 3 and
1′ agree in S also.
• But we already know that
process 1′ decides 1 and
process 3 decides 0, in S.
• Contradiction!
0
2
0
0
3
1
0
1
S
0
1
3′
1
2′
1′
1
1
1
1
A
0
3
2
Discussion
• We get this contradiction even if the original
algorithm A is... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
process simulates the entire Ii group.
B1
– Bi initializes all processes in Ii with Bi’s initial value.
– At each round, Bi simulates sending messages:
• Local: Just simulate locally.
• Remote: Package and send.
B2
– If any simulated process decides, Bi decides the same (use any).
• Show B satisfies correctness conditi... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
(“if”):
– Suppose both hold.
– Then we can simulate a total-connectivity algorithm.
– Key is to emulate reliable communication from any node i to any
other node j.
– Rely on Menger’s Theorem, which says that a graph is c-connected
(that is, has conn ≥ c) if and only if each pair of nodes is connected
by ≥ c node-di... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
3
0
0
4
1
1
1′
Proof (conn = 2, 1 failure)
• Finally, consider 3′, 4′, and 1 in S:
– Looks to them like they’re in A, with a
faulty process 2.
– In A, they must agree, so they also
agree in S.
– But 3′ decides 0 and 1 decides 1 in S,
contradiction.
• Therefore, we can’t solve BA in
canonical graph, with 1 failure.... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
for 2-Generals problem.
WBA Processor Bounds
• Theorem 4: Weak BA is solvable in an n-node
graph G, tolerating f faults, if and only if n > 3f and
conn(G) > 2f.
• Same bounds as for BA.
• Proof:
– “If”: Follows from results for ordinary BA.
– “Only if”:
• By constructions like those for ordinary BA, but slightly mo... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
Weak BA)
• Now consider a block of 2b + 1 consecutive processes that
begin with 0:
1
2
0
0
• Claims:
3
0
1
0
2
0
3
0
1
0
2
0
3
0
– To all but the endpoints, the execution of S is indistinguishable from
α0, the failure-free execution in which everyone starts with 0, for 1
round.
– To all but two at each end, indisti... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
and the two must have the same decision values.
– Decision values in first and last executions must be the same.
– Contradiction.
Round lower bound, f = 1
• α0: All processes have input 0, no failures.
• …
• αk (last one): All inputs 1, no failures.
• Start the chain from α0.
• Next execution, α1, removes message 1 → ... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
have input 0, no failures, 2 rounds:
– Work toward α n, all 1’s, no failures.
– Each consecutive pair is indistinguishable
0
to some nonfaulty process.
– Use intermediate execs αi, in which:
• Processes 1,…,i have initial value 1.
• Processes i+1,…,n have initial value 0.
• No failures.
0
0
0
Special case: f = 2
• Sh... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
execution where 1 → 2 at round 1, but p2 sends no round 2
messages.
– Now remove the round 1 message 1 → 2.
• Executions look the same to all but 1 and 2 (and they’re nonfaulty).
– Replace all the round 2 messages from p2, one by one, until p2 is
no longer faulty.
• Repeat to remove p1’s round 1 messages to p3, p4,…
... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
is…
• Univalent, if α is either 0-valent or 1-valent (essentially decided).
• Bivalent, if both decisions occur in some extensions (undecided).
Initial bivalence
• Lemma 1: There is some 0-round execution
(vector of initial values) that is bivalent.
• Proof (adapted from [FLP]):
– Assume for contradiction that all 0... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
j1, j2,…jm}.
• Define a chain of (k+1)-round executions,
α0, α1, α2,…, αm.
• Each αl in this sequence is the same as α0
except that i also sends messages to j1,
j2,…jl.
– Adding in messages from i, one at a time.
• Each αl is univalent, by assumption.
• Since α0 is 0-valent, there are 2 possibilities:
– At least one... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
.
And now the final round…
• Lemma 3: There is an f-round execution in which two
nonfaulty processes decide differently.
• Contradicts the problem requirements.
• Proof:
– Use Lemma 2 to get a bivalent (f-1)-round execution α
with ≤ f-1 failures.
– In every 1-round extension of α, everyone who hasn’t
failed must dec... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
0] Stopping agreement
algorithm in which all nonfaulty processes terminate in ≤
min(f′ + 2, f+1) rounds.
– If f′ + 2 ≤ f, decide “early”, within f′ + 2 rounds; in any case decide
within f+1 rounds.
[Keidar, Rajsbaum 02] Lower bound of f′ + 2 for early-
stopping agreement.
– Not just f′ + 1. Early stopping requires an... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
0 and val(α1) = 1.
In the ff extensions of α0 and α1, all nonfaulty processes decide in just
one round.
• Define:
– β0, 1-round extension of α0, in which process i fails, sends only to j.
– β1, 1-round extension of α1, in which process i fails, sends only to j.
• Then:
– β0 looks to j like ff extension of α0, so j dec... | https://ocw.mit.edu/courses/6-852j-distributed-algorithms-fall-2009/0d1d84b9fd1e74bf8e2f8ad916cfca0d_MIT6_852JF09_lec05.pdf |
(cid:2)
2/25/16(cid:2)
2.341J Lecture 6: Extensional Rheometry:
From Entangled Melts to Dilute Solutions
Professor Gareth H. McKinley
Dept. of Mechanical Engineering, M.I.T.
Cambridge, MA 01239
http://web.mit.edu/nnf
1(cid:2)
The Role of Fluid Rheology(cid:1)
•
“Slimy”y
•
”
“Sticky”
3(cid:2)0(cid:2)
• Other manifes... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
excluded from our Creative
Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/.
2(cid:2)
Transient Extensional Rheometry(cid:1)
McKinley, (cid:2)
Ann. Rheol. Reviews 2005(cid:2)
• The extensional viscosity is best considered as a transient material
function: follow evolution from equil... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
cid:2)
(e)(cid:2)
(e)(cid:2)
© The British Society of Rheology. All rights reserved. This content is
excluded from our Creative Commons license. For more information,
see https://ocw.mit.edu/help/faq-fair-use/.
© Air Products and Chemicals, Inc. All rights
reserved. This content is excluded from our
Creative Commons li... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
cid:2)
Increasing molecular
alignment at higher strain rates(cid:2)
t
ε(t) = ∫
−∞
ε˙ (t ′ ) dt ′ = ln
L
(t)
L0
Deborah(cid:2)
Number(cid:2)
De = λ(cid:1)ε0
7(cid:2)77
© source unknown. All rights reserved. This content is excluded from our Creative
Commons license. For more information, see https://ocw.mit.edu/help/f... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
)
(cid:1) Mn = 17,000; Mw = 243,000; Mw/ Mn = 14.3
(cid:1) CH3/1000C = 23
(cid:1) Very similar to the IUPAC A reference material
(cid:1) Same polymer as that used by
Münstedt et al., Rheol. Acta 37, 21-29 (1998)
‘Münstedt rheometer’ (end separation method)
SER Principle of Operation(cid:1)
•
•
“Constant Sample Le... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
All rights reserved. This content is excluded
from our Creative Commons license. For more information,
see https://ocw.mit.edu/help/faq-fair-use/.
6(cid:2)
2/25/16(cid:2)
Results for Simple Fluids(cid:1)
• Newtonian Fluids
(cid:1) McKinley & Tripathi, J Rheol., 2000
• Ideal Elastic Fluids
(cid:1) Entov & Hinch, J... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
p
e
s
η
[
λz
101
101
101
100
100
100
106
106
106(cid:2)
107
107
M
w
[g/mol]
M
[g/mol]
Mw [g/mol](cid:2)
w
0.01
0
5
10
15
20
/σ)
R
t/(η0
0
25
30
35
40
Finite Extensibility(cid:1)
•
Important in many biological processes (saliva, spinning of spider silk)
14(cid:2)
© The British Society of Rheology. All rights reserved.... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
Surfactants(cid:2)
• Solutions of EHAC (Schlumberger VES
“clearfrac”,) in brine
Dmid (t) ⇒ (cid:2)ε(t) = − 2
Dmid
dDmid
dt
⇒ η
E,apparent (t)
Yesilata, Clasen & McKinley, JNNFM 133(2) 2006(cid:2)
Kim, Pipe, McKinley; Kor-Aust Rheol. J, 2010(cid:2)
CC by-nc-nd. Some rights reserved. This content is excluded from our Cre... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
York Times Company. All rights reserved. This content is excluded from our Creative
Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/.
9(cid:2)
2/25/16(cid:2)
Rayleigh Time Scale
tR ≈
3
ρR0
σ
≈ 0.020s
Break Up of Low Viscosity Liquids(cid:1)
• 0.1 wt% PEO (2x106 g/mol) in water
η0 ≈ 1.... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
cid:24)(cid:31)(cid:19)(cid:28)(cid:31)(cid:24)(cid:32)(cid:36)(cid:1)(cid:7)(cid:6)(cid:10)(cid:6)(cid:38)(cid:12)(cid:1)(cid:9)(cid:28)(cid:20)(cid:21)(cid:25)(cid:1)(cid:1)
The limit of infinite dilution: single molecule experiments(cid:1)
•
Label DNA as a model “supersized” single flexible molecule
The Cross Slot Ap... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
˙ 1
0
Anna et al. J. Rheol. 2001(cid:2)
© The Society of Rheology, Inc. All rights reserved. This content is excluded from our Creative
Commons license. For more information, see https://ocw.mit.edu/help/faq-fair-use/.
(cid:2)
)
y
t
i
s
o
c
s
v
i
r
a
e
h
s
(
/
)
y
t
i
s
o
c
s
v
i
l
i
a
n
o
s
n
e
t
x
e
(
Increasing (cid... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
R. Cohn, U. Louisville(cid:2)
© The Company of Biologists Ltd.
All rights reserved. This content is
excluded from our Creative Commons
license. For more information, see
https://ocw.mit.edu/help/faq-fair-use/.
© source unknown. All
rights reserved. This content
is excluded from our
Creative Commons license.
For ... | https://ocw.mit.edu/courses/2-341j-macromolecular-hydrodynamics-spring-2016/0d326f50e4b153281740a7d4b933e5ea_MIT2_341JS16_Lec06-slides.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.854J / 18.415J Advanced Algorithms
Fall 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
�
�
18.415/6.854 Advanced Algorithms
September 17, 2008
Lecturer: Michel X. Goemans
Lecture 5
Today, we continue the discussion ... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
optimal. In other words
�(f ) = min{� : ∃ potential p : V
→
R such that cp(v, w) ≥ −� for all edges (v, w) ∈ Ef }.
We proved that for all circulations f ,
�(f ) = −µ(f ).
A consequence of this equality is that there exists a potential p such that any minimum mean cost
cycle Γ satisfies cp(v, w) = −�(f ) = µ(f ) fo... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
iterations. Finally, the running time per a single iteration is O(mn) using a variant
of Bellman-Ford (see problem set).
�(f �) ≤ 1 −
�(f ).
�
5-1
1.2 Towards a faster algorithm
In the above algorithm, a significant amount of time is used to compute the minimum cost cycle.
This is unnecessary, as our goal is sim... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
.
(b) Tighten: Update p to p� and � to ��, where p� and �� are chosen such that cp� (v, w) ≥ −��
�
1 �.
for all edges (v, w) ∈ Ef and �� ≤ 1 − n
�
Remark 1 We do not update the potential p every time we push a flow. The potential p gets updated
in the tighten step after possibly several flows are pushed through in... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
are skew-symmetric;
• At least one admissible edge is removed from the residual graph, since we push the maximum
possible amount of flow through the cycle.
5-2
Since we begin with at most m admissible edges, we cannot cancel more than m cycles, as each cycle
canceling reduces the number of admissible edges by at l... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
actually need to find the best possible ��, it is
possible to vastly reduce the running time of the Tighten step to O(n), as follows.
�
When the Cancel step terminates, there are no cycles in the admissible graph Ga = (V, A), the
subgraph of the residual graph with only the admissible edges. This implies that there ... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
.
We consider two cases, depending on whether or not l(v) < l(w).
Case 1: l(v) < l(w). Then
cp� (v, w) = cp(v, w) + (l(w) − l(v))�/n
≥ −� + �/n
= −(1 − 1/n)�.
Case 2: l(v) > l(w), so that (v, w) is not an admissible edge. Then
cp� (v, w) = cp(v, w) + (l(w) − l(v))�/n
≥ 0 − (n − 1)�/n
= −(1 − 1/n)�.
In either ... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
vertex v that has no outgoing edges, then we backtrack, deleting from A the
edges that we backtrack along, until we find an ancestor r of v for which there is another child
to explore. (Notice that every edge we backtrack along cannot be part of any cycle.) Continue
the DFS by exploring paths outgoing from r.
2. If ... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
Time
From the above analysis, we see that the Cancel step requires O(mn) time per iteration, whereas
the Tighten step only requires O(m) time per iteration. In the previous lecture, we determined
that the Cancel-and-Tighten algorithm requires O(min(n log(nC), mn log n)) iterations. Hence the
overall running time is... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
with key[x] = k; if so, returns the
object, and if not, returns false.
• Insert(x): Inserts a new node x into the tree.
• Delete(x): Deletes x from the tree.
• Min: Finds the node with the minimum key from the tree.
• Max: Finds the node with the minimum key from the tree.
• Successor(x): Find the node with the s... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
data structure called splay trees, which is a self-balancing
BST with amortized cost of O(log n) per operation. The idea is that every time a node is accessed,
it gets pushed up to the root of the tree.
The basic operations of a splay tree are rotations. They are illustrated the following diagram.
5-5
ABCxyABCxyzi... | https://ocw.mit.edu/courses/6-854j-advanced-algorithms-fall-2008/0d3338683064d96b5174095829043b93_lec5.pdf |
Lecture 04
Generalization error of SVM.
18.465
Assume we have samples z1 = (x1, y1), . . . , zn = (xn, yn) as well as a new sample zn+1. The classifier trained
on the data z1, . . . , zn is fz1,...,zn .
The error of this classifier is
Error(z1, . . . , zn) = Ezn+1 I(fz1,...,zn (xn+1) =�
yn+1) = Pzn+1 (fz1,...,zn (x... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
-out error. We now prove such a bound for SVMs. Recall that the solution of SVM is
ϕ =
�
n+1 α0
i=1
i yixi.
Theorem 4.1.
L.O.O.E. ≤
min(# support vect., D2/m2)
n + 1
where D is the diameter of a ball containing all xi, i ≤ n + 1 and m is the margin of an optimal hyperplane.
Remarks:
•
•
1
dependence on sam... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
i
=
=
=
�
�
�
α0
i
α0
i (yi(ϕ xi + b) − 1) +
·
��
0
� �
0 − b
αi
α0
i yi
� �� �
0
�
D2
.
m2
�
We now prove Lemma 4.1. Let u ∗ v = K(u, v) be the dot product of u and v, and �u� = (K(u, u))1/2 be
, xn+1 ∈ Rd and y1,
the corresponding L2 norm. Given x1,
· · ·
· · ·
, yn+1 ∈ {−1, +1}, recall th... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
0. Let
αiyi = 0. In other words, α0 corresponds to
, n+1} and α� corresponds to the support vector
αiyixi� 2. Let α0 = argmaxαw(α) subject to αi ≥ 0 and �
αiyi = 0, and ψ = �
αiyixi. Since the
�
�
�
1
2
1
1
classifier trained from {(xi, yi) : i = 1,
· · ·
, p − 1, p + 1,
· · ·
1
↓
· · · ,
,
, n + 1}. Le... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
than the margin m(α0),
7
p ·
�
Lecture 04
Generalization error of SVM.
18.465
and w(α�) ≤ w(α0). On the other hand, the hyperplane determined by α0 − α0 γ might not separate (xi, yi)
p ·
for i =�
p and corresponds to a equivalent or larger “margin” 1/�ψ(α0 − α0 γ)� than m(α�)).
p ·
Let us consider the inequali... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
α� + tγ) − w(α�) =
t
1 (1 − yp · ψ� ∗ xp)2
.
�xp�2
2
For the right hand side,
w(α0 − αp
0 · γ) =
=
�
0 − αp
αi
0 −
�
i − α0
α0
p −
1 �
�
2
�
0 yixi −αp
αi
��
�
ψ0
0 ypxp�2
1
�ψ0�2 + αp
2
�
�2
α0
p
1
2
�xp�2
0 ypψ0 ∗ xp −
�
αp
0�2
1
2
�xp�2
= w(α0) − α0
p(1 − yp · ψ0 ∗ xp) −
1 �... | https://ocw.mit.edu/courses/18-465-topics-in-statistics-statistical-learning-theory-spring-2007/0d49e3d6b669cbbb13ef85b0e21357a8_l4.pdf |
Lecture 14
8.324 Relativistic Quantum Field Theory II
Fall 2010
8.324 Relativistic Quantum Field Theory II
MIT OpenCourseWare Lecture Notes
Hong Liu, Fall 2010
Lecture 14
We now consider the Lagrangian for quantum electrodynamics in terms of renormalized quantities.
L = −
B (γµ(∂µ − ieB AB
µ ) − mB )ψB
= −
− ... | https://ocw.mit.edu/courses/8-324-relativistic-quantum-field-theory-ii-fall-2010/0d50ef39c801edcfae579fa8d371c85d_MIT8_324F10_Lecture14.pdf |
)ψ
L0 is the free Lagrangian, L1 is the interaction Lagrangian, and Lct is the counter-term Lagrangian. The
parameters Z3 − 1, Z2 − 1 and δm are specified by the following renormalization conditions:
1
iϵ−�(k/) ,
1. For the spinor propagator, S(k) = ik/−m+
k/=−im = 0 (Physical mass condition),
= 0 (Physical field c... | https://ocw.mit.edu/courses/8-324-relativistic-quantum-field-theory-ii-fall-2010/0d50ef39c801edcfae579fa8d371c85d_MIT8_324F10_Lecture14.pdf |
TEX FUNCTION
Consider the effective vertex we defined before:
Γµ
phys
(k, k) =
µ
≡ −iephysγµ.
k
k
(3)
(4)
This is the physical vertex: it captures the full electromagnetic properties of a spinor interacting with a photon.
As we showed in the previous lecture, the Ward identities impose that
Γµ(k, k) = −ieγµ
... | https://ocw.mit.edu/courses/8-324-relativistic-quantum-field-theory-ii-fall-2010/0d50ef39c801edcfae579fa8d371c85d_MIT8_324F10_Lecture14.pdf |
the on-shell spinor identities
(7)
ku/ s(k) = −imus(k),
u¯s(k)k/ = −imu¯s(k).
2
̸
Lecture 14
8.324 Relativistic Quantum Field Theory II
Fall 2010
Hence, A, B, and C are scalars, and functions of the scalars k1
the Ward identities, we have that
2 , k2
2 and k1.k2, or, equivalently, of q2 and m. From
and, as ¯... | https://ocw.mit.edu/courses/8-324-relativistic-quantum-field-theory-ii-fall-2010/0d50ef39c801edcfae579fa8d371c85d_MIT8_324F10_Lecture14.pdf |
k2v − k1v u¯s′ (k2)γv γµus(k1)
k2v − k1v
2
2
k2v + k1v
2
{γµ, γν
} −
)
(
]
u¯s′ (k2)
u¯s′ (k2) [(k2
µ + k1
µ) + iqvσµν ] us(k1).
)
]
[γµ, γν ]
us(k1)
From this, we find that
[
γµF1(q 2) −
iΓµ(k1, k2) = e
]
σµν qν F2(q 2)
.
2m
(9)
�
(10)
F1(q2) and F2(q2) are known as form factors. We have that eF1... | https://ocw.mit.edu/courses/8-324-relativistic-quantum-field-theory-ii-fall-2010/0d50ef39c801edcfae579fa8d371c85d_MIT8_324F10_Lecture14.pdf |
18.600: Lecture 38
Review: practice problems
Scott Sheffield
MIT
1I Compute the variance of X 2.
I If X1, . . . , Xn are independent copies of X , what is the
probability density function for the smallest of the Xi
Order statistics
I Let X be a uniformly distributed random variable on [−1, 1].
2I If X1, . . . , X... | https://ocw.mit.edu/courses/18-600-probability-and-random-variables-fall-2019/0db69ebc69650e5313b7624486ab79e4_MIT18_600F19_lec38.pdf |
−1
5Order statistics
—
answers
I
Var[X 2] = E [X 4] − (E [X 2])2
1
2
x 2dx)2
Z 1
1
5
−
=
1
9
=
4
.
45
Z 1
−1
=
x 4dx − (
1
2
I Note that for x ∈ [−1, 1] we have
Z 1 1
2
P{X > x} =
−1
x
dx
=
1 − x
.
2
If x ∈ [−1, 1], then
P{min{X1, . . . , Xn} > x}
= P{X1 > x, X2 > x, . . . , Xn > ... | https://ocw.mit.edu/courses/18-600-probability-and-random-variables-fall-2019/0db69ebc69650e5313b7624486ab79e4_MIT18_600F19_lec38.pdf |
each
equal to 1 with probability 1/3 and equal to 2 with probability
2/3.
I Compute the entropy H(X ).
9I Which is larger, H(X + Y ) or H(X , Y )? Would the answer to
this question be the same for any discrete random variables X
and Y ? Explain.
Entropy
I Suppose X and Y are independent random variables, each
eq... | https://ocw.mit.edu/courses/18-600-probability-and-random-variables-fall-2019/0db69ebc69650e5313b7624486ab79e4_MIT18_600F19_lec38.pdf |
, Y ) is larger, and we have H(X , Y ) ≥ H(X + Y ) for any
X and Y . To see why, write a(x, y ) = P{X = x, Y = y } and
b(x, y ) = P{X + Y = x + y }. Then a(x, y ) ≤ b(x, y ) for any
x and y , so
H(X , Y ) = E [− log a(x, y )] ≥ E [− log b(x, y )] = H(X + Y ).
Entropy
—
answers
I
I
1
2
H(X ) = (− log ) +
(− log )... | https://ocw.mit.edu/courses/18-600-probability-and-random-variables-fall-2019/0db69ebc69650e5313b7624486ab79e4_MIT18_600F19_lec38.pdf |
ocw.mit.edu
18.600 Probability and Random Variables
Fall 2019
For information about citing these materials or our Terms of Use, visit:
https://ocw.mit.edu/terms.
15 | https://ocw.mit.edu/courses/18-600-probability-and-random-variables-fall-2019/0db69ebc69650e5313b7624486ab79e4_MIT18_600F19_lec38.pdf |
MIT 2.853/2.854
Manufacturing Systems
Introduction to Simulation
Lecturer: Stanley B. Gershwin
... with many slides by Jeremie Gallien
Copyright c(cid:13)2009 Stanley B. Gershwin.
Copyright c(cid:13)2009 Stanley B. Gershwin.
2
Slide courtesy of Jérémie Gallien. Used with permission.
What is
Simulation?
A computer sim... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
Discrete time
⋆ Discrete event
⋆ Solution of differential equations — I don’t consider
this simulation, but others do.
Copyright c(cid:13)2009 Stanley B. Gershwin.
7
What is
Simulation?
Types of simulation
Copyright c(cid:13)2009 Stanley B. Gershwin.
8
Slide courtesy of Jérémie Gallien. Used with permission.
What is
... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
if (rand(1)<$r1){$alpha1[$step+1]=1}
else{$alpha1[$step+1]=0}}
• if(($alpha1[$step+1]==1)&&($n[$step]<$N)) {$IU=1}
else{$IU=0}
Copyright c(cid:13)2009 Stanley B. Gershwin.
12
Dynamic
Simulation
Discrete Time Simulation
Two-Machine Line
Machine 2 is similar, except:
if(($alpha2[$step+1]==1)&&($n[$step]>0)){$ID=1;$out++... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
clock to the time of the first event on the list.
4. Update the state of the system according to that event.
Copyright c(cid:13)2009 Stanley B. Gershwin.
16
Dynamic
Simulation
Discrete Event Simulation
5. Determine if any new events are made possible by the change
in state, calculate their times (in the same way as in ... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
crete Event Simulation
initialization()
• all variables are initialized
timing(event_list)
• next_eventis determined;
• sim_clock is updated.
event_occurence(next_event)
termination
test?
report_generator(stat_counters)
• system_stateis updated;
• stat_countersis updated;
• rv_generation()is used to
update event_list... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
and the sequence of Zi(ω) satisfies certain
conditions.
Copyright c(cid:13)2009 Stanley B. Gershwin.
24
Dynamic
Simulation
Random numbers
Pseudo-random number generator
Copyright c(cid:13)2009 Stanley B. Gershwin.
25
Slide courtesy of Jérémie Gallien. Used with permission.
Dynamic
Simulation
Random numbers
Pseudo-rand... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
31
Slide courtesy of Jérémie Gallien. Used with permission.
Dynamic
Simulation
Technical Issues
Statistics, Repetitions,
Run Length, and Warmup
• The purpose of simulation is to get quantitative
performance measures such as production rate,
average inventory, etc.
• The data that comes from a simulation is statistical... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
• Required: warmup period ≥ transient period.
• Problem: it is very hard to determine the transient
period.
Copyright c(cid:13)2009 Stanley B. Gershwin.
35
Dynamic
Simulation
Example:
Technical Issues
Statistics, Repetitions,
Run Length, and Warmup
• 20-machine line.
• ri = .1, pi = .02, i = 1, ..., 19; r20 = .1, p20 ... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
000 300000 400000 500000 600000 700000 800000 900000 1e+06
Buffer 1
Buffer 10
Buffer 19
Copyright c(cid:13)2009 Stanley B. Gershwin.
38
Dynamic
Simulation
The Simulation Process
Technical Issues
1 Define the simulation goal
Statistics, Repetitions,
• Never skip!
Run Length, and Warmup
2 Model the system
• Keep the goa... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
simpler.” Albert Einstein.
• The simulation goal should be the guiding light when
deciding what to model
• Start to build your model ON PAPER!
• Get client/user feedback early, and maintain model +
assumption sheet for communication purposes
• Collect data and fit distributions… after modeling the
system, with sensi... | https://ocw.mit.edu/courses/2-854-introduction-to-manufacturing-systems-fall-2016/0dc16a918eabd3f47e3f6d573485dccf_MIT2_854F16_Simulation.pdf |
Lecture 2
(cid:40)(cid:88)(cid:70)(cid:79)(cid:76)(cid:71)(cid:72)(cid:68)(cid:81)(cid:3)(cid:36)(cid:79)(cid:74)(cid:82)(cid:85)(cid:76)(cid:87)(cid:75)(cid:80)(cid:15)(cid:3)(cid:51)(cid:85)(cid:76)(cid:80)(cid:72)(cid:86)
Euclidean gcd Algorithm - Given a, b ∈ Z, not both 0, find (a, b)
• Step 1: If a, b < 0, replace... | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
many non-negative
integers less than initial a, there can only be finitely many steps. (Note: because
it decreases by at least 1 at each step, this proof only shows a bound of O(a)
steps, when in fact the algorithm always finishes in time O(log(a)) (left as
(cid:4)
exercise))
To get the linear combination at the same tim... | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
.
Lemma 6. If p is prime and p|ab, then p|a or p|b.
Proof. Assume p (cid:45) a, and let g = (p, a). Since p is prime, g = 1 or p, but can’t be
p because g|a and p (cid:45) a, so g = 1. Corollary from last class (4) shows that p|b. (cid:3)
Corollary 7. If p|a1a2 . . . an, then p|ai for some i.
Proof. Obvious if n = 1, a... | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
1 . . . q
not
in the set of counterexamples by minimality of n, and so r − 1 = s − 1 and
p2 . . . pr is a permutation of q1 . . . qi 1qi+1 . . . qs, and so r = s and p1p .
2 . . pr is a
−
(cid:4)
permutation of q1q2 . . . qs. (
s. This number is less than n, and
so
−
)
(cid:32)
Theorem 8 (Euclid). There are infinitely m... | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
1 +
1
p
1
+
1
2
p1
+
1
p3
1
(cid:18)
(cid:19) (cid:18)
. . .
1 +
+
where
1
1 + +
pi
+
1
p3
2
(cid:19)
1
p2
1
p2
i
1
p2
2
1
p3
i
+
. . .
=
1
−
1
1
pi
<
∞
(cid:19)
(cid:18)
. . . 1 +
. . .
1
pm
+
1
p2
m
(cid:19)
. . .
Since each term is a finite positive number, Σ is also a finite positive number.
After expanding Σ, we can... | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
infinitely many Mersenne primes, ie., primes of the form 2n − 1.
Note: if 2n − 1 is prime, then n itself must be a prime.
4MIT OpenCourseWare
http://ocw.mit.edu
18.781 Theory of Numbers
Spring 2012
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. | https://ocw.mit.edu/courses/18-781-theory-of-numbers-spring-2012/0ddadd3b4c7f386b2ae48a28b6f5ab47_MIT18_781S12_lec2.pdf |
2.4 DNA structure
×
109 for human, to 9
DNA molecules come in a wide range of length scales, from roughly 50,000 monomers in a
1010 nucleotides in the lily. The latter would be around
λ-phage, 6
thirty meters long if fully stretched. If we consider DNA as a random (non-self avoiding)
Rp, coming to
chain of persistence ... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
bubble, which is observed experimentally to depend on the length l
of the denatured fragment as
S(l)
≈
bl + c log l + d , with c
1.8kB .
≈
(2.71)
The logarithmic dependence is a consequence of loop closure, and can be justified as follows.
The two single-stranded segments forming a bubble can be regarded as a loop of le... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
choices by this volume factor. As we
shall see shortly, the parameter g is important in determining the value of the denaturation
temperature, while c controls the nature (sharpness) of the transition.
∝
2.4.1 The Poland–Scheraga model for DNA Denaturation
Strictly speaking, the denaturation of DNA can be regarded as a... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
polyamino acids,” J. Chem. Phys. 45, 1456 (1966).
49
The single-stranded portions are more flexible, and provide an entropic advantage that is
modeled according to a weight similar to Eqs. (2.73-2.74), as
B(l) =
gl
lc .
(2.77)
Clearly the above weight cannot be valid for strands shorter than a persistence length, but
b... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
=
Xl=1
zw
zw
1
−
,
while the contribution from a bubble is
∞
∞
B(z) =
zlΩ(l) =
zlgl
lc ≡
f +
c (zg) .
Xl=1
The result for bubbles has been expressed in terms of the functions f +
n (x), frequently en-
countered in describing the ideal Bose gas in the grand canonical ensemble. We recall some
Xl=1
50
(2.82)
(2.83)
∞
X... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
−
1
zw −
1
−
(cid:20)
f +
c (zg)
,
(cid:21)
(2.88)
from which we can extract physical observables. For example, while the length L is a
random variable in this ensemble, for a given z, its distribution is narrowly peaked around
the expectation value
= z
L
i
h
∂
∂z
log
Z
(z) =
1
zw + f +
1
c−1(zg)
f +
c (zg)
1
zw −
−
.
... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
Eqs. (2.90-2.91), we see that this limit
is obtained by setting the denominator in these expressions equal to zero, i.e.
from the
condition
f +
c (zg) =
1
zw −
1 .
(2.92)
The type of phase behavior resulting from Eqs. (2.92-2.91), and the very existence of a
transition, depend crucially on the parameter c, and we can d... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
) in the denominator of Eq. (2.91), we observe that Θ is zero
wc, i.e. the polymer is fully denatured. On approaching the transition point from
≤
52
the other side, Θ goes to zero continuously. Indeed, Eq. (2.93) implies that a small change
1
w
δw
c−1 .
−
≡
Since f +
zg)c−2, we conclude from Eq. (2.91) that the native... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
c in controlling the nature/existence of the
phase transition can be gleaned by examining the behavior of a single bubble. Examining
the competition between entropy and energy suggests that the probability (weight) of a loop
of length ℓ = 2l is proportional to
p(ℓ)
∝
g
w
ℓ
1
ℓc .
×
(2.95)
(cid:16)
(cid:17)
1.
The proba... | https://ocw.mit.edu/courses/8-592j-statistical-physics-in-biology-spring-2011/0df04225a5ce78faa6d53d8a3167c3ea_MIT8_592JS11_lec16.pdf |
Normal equations
Random processes
6.011, Spring 2018
Lec 15
1
Zillow (founded 2006)
© Zillow. All rights reserved. This content is excluded from our Creative Commons license.
For more information, see https://ocw.mit.edu/help/faq-fair-use/
2Zestimates
© Zillow. All rights reserved. This co... | https://ocw.mit.edu/courses/6-011-signals-systems-and-inference-spring-2018/0df9fff5e1e92239e0f755a893117b91_MIT6_011S18lec15.pdf |
6.897: Advanced Topics in Cryptography
Lecturer: Ran Canetti
Focus for first half (until Spring Break):
Foundations of cryptographic protocols
Goal: Provide some theoretical foundations of secure
cryptographic protocols:
• General notions of security
• Security-preserving protocol composition
• Some basic construc... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
/4/4): The multi-commitment functionality and
realization. UC Zero Knowledge from UC commitments.
Universal composition with joint state. Problem Set 1 due.
Lecture 10 (3/5/4): Secure realization of any multi-party
functionality with any number of faults (based on
[GMW87,G98,CLOS02]): The semi-honest case. (Static... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
a single framework.
– Conceptual and technical simplicity.
What do we want from a definition of security for a
given task?
• Should be mathematically rigorous
(I.e., should be well-defined how a protocol is modeled
and whether a given protocol is “in” or “out”).
• Should provide an abstraction (“a primitive”) tha... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
n .
– An underlying communication network
• Want to design a “secure” protocol where each p has output
i
f(x1…xn,,r) .That is, want:
– Correctness: The honest parties get the correct function value of the
i
parties’ inputs.
– Secrecy: The corrupted parties learn nothing other than what is
computable from their in... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
Counter example:
Function: F(-,- ) = (r U D,-)
Protocol: P1 chooses r U D, and sends r to P2 .
The protocol is clearly not secret (P2 learns r). Yet, it is possible to generate
P2 ‘s view (it’s a random bit).
(cid:206) Need to consider the outputs of the corrupted parties together with the
outputs of the uncorru... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
ensembles,
i.e. ensembles where each Dk,a is over {0,1}.
• Relations between ensembles:
– Equality: D=D’ if for all k,a, Dk,a = D’k,a .
– Statistical closeness: D~D’ if for all c,d>0 there is a k0
such that for all k> k0 and all a with |a|< kd we have
Prob[xDk,a, x=1] - Prob[xD’k,a, x=1] < k-c .
• Multiparty f... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
• Participants:
– An n-party protocol P=(P1 …Pn). (any n>1)
– Adversary A, controlling a set B of “bad parties” in P.
(ie, the bad parties run code provided by A)
– Environment Z (the initial ITM)
• Computational process:
– Z gets input z
– Z gives A an input a and each good party P an input x
– Until all partie... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
to F
– Bad parties send o F whatever S says. In addition, S sends its own input.
– F evaluates f on the given inputs (tossing coins if necessary) and hands
each party and S its function value. Good parties set their outputs to this
value.
i
i
– S and all parties write their outputs on Z’s subroutine output tape.... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
:
Whatever A computes can be computed
•
given only the prescribed outputs
Input independence: The inputs of the bad parties are
chosen independently of the inputs of the good
parties.
Equivalent formulations:
• Z outputs an arbitrary string (rather than one bit) and Z’s
outputs of the two executions should be ... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
ination.
Is security maintained under these operations?
Examples
• Composition of instances of the same protocol:
– With same inputs/different inputs
– Same parties/different parties/different roles
– Sequential, parallel, concurrent (either coordinated or
uncoordinated).
• “Subroutine composition” (modular compo... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
f.
Notes:
•
In QP, there is at most one protocol active (ie, sending messages) at any
point in time: When P is running, Q is suspended.
It is important that in P all parties terminate the protocol at the same round.
Otherwise the composition theorem does not work…
If P is a protocol in the real-life model then so... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
At the end of the run, output the current state of A.
From the security of P we have that there is an
Sp,Z ~ EXECP,A,Z .
adversary SP such that IDEALf
Note: Here it is important that the input of AP is general
and not only the inputs of the bad parties to the
function.
Adversary H :
– Until the round where the pa... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
A runs from the state in
the output of the external adversary.
– When the internal outputs are generated, hand them to
Z and outputs whatever Z outputs.
Analysis of ZP :
Can verify:
–
–
If the “external system” that ZP interacts with is an ideal
process for f with adversary SP then the simulated Z
sees exactly... | https://ocw.mit.edu/courses/6-897-selected-topics-in-cryptography-spring-2004/0dfd54053823c507a9a117d910d31ff5_lecture1_2.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.189 Multicore Programming Primer, January (IAP) 2007
Please use the following citation format:
Saman Amarasinghe, 6.189 Multicore Programming Primer, January
(IAP) 2007. (Massachusetts Institute of Technology: MIT
OpenCourseWare). http://ocw.mit.edu (accessed MM DD, YYYY). ... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
IAP 2007 MIT
Pipelining Execution
IF: Instruction fetch
EX : Execution
ID : Instruction decode
WB : Write back
Cycles
Instruction #
Instruction i
1
IF
Instruction i+1
Instruction i+2
Instruction i+3
Instruction i+4
2
ID
IF
3
4
5
6
7
8
EX WB
ID
IF
EX WB
ID
IF
EX WB
ID
IF
EX WB
ID
EX WB ... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
source program
Dependences are a property of programs
Importance of the data dependencies
1) indicates the possibility of a hazard
2) determines order in which results must be calculated
3) sets an upper bound on how much parallelism can possibly
be exploited
● Goal: exploit parallelism by preserving pro... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
2007 MIT
●
●
Control Dependencies
● Every instruction is control dependent on some set of
branches, and, in general, these control dependencies must
be preserved to preserve program order
if p1 {
S1;
};
if p2 {
S2;
}
● S1 is control dependent on p1, and S2 is control dependent
on p2 but not on p1.
● Control depen... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
8008
8080
1
'70
Sun's Surface
Rocket Nozzle
Nuclear Reactor
8086
8085
286
386
Hot Plate
486
'80
'90
'00
'10
Image by MIT OpenCourseWare.
Intel Developer Forum, Spring 2004 - Pat Gelsinger
(Pentium at 90 W)
Cube relationship between the cycle time and pow
Prof. Saman Amarasinghe, MIT.
14
6.189 IAP 2007 MIT
Pe... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
● To maintain throughput T/cycle when each operation has
latency L cycles, need T*L independent operations
● For fixed parallelism:
decreased latency allows increased throughput
decreased throughput allows increased latency tolerance
6.189 IAP 2007 MIT
18
Prof. Saman Amarasinghe, MIT.
e
m
T
i
e
m
T
i
Types... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
(Transputers, nCube, CM-5)
non-cache-coherent shared memory machines (BBN Butterfly, T3D)
cache-coherent shared memory machines (Sequent, Sun Starfire, SGI
Origin)
● MISD: Multiple Instruction, Single Data
no commercial examples
Prof. Saman Amarasinghe, MIT.
22
6.189 IAP 2007 MIT
My Classification
● By ... | https://ocw.mit.edu/courses/6-189-multicore-programming-primer-january-iap-2007/0e56d30fb5cce40a429b63435d2a039a_lec3architctre.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.